default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2007
- Ingmar Baumgart, Bernhard Heep, Stephan Krause:
A P2PSIP Demonstrator Powered by OverSim. Peer-to-Peer Computing 2007: 243-244 - Danny Bickson, Roy Borer:
The BitCod Client: A BitTorrent Clone using Network Coding. Peer-to-Peer Computing 2007: 231-232 - Danny Bickson, Dahlia Malkhi, Lidong Zhou:
Peer-to-Peer Rating. Peer-to-Peer Computing 2007: 211-218 - Cristiano P. Costa, Jussara M. Almeida:
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems. Peer-to-Peer Computing 2007: 53-60 - Dimitri do B. DeFigueiredo, Balaji Venkatachalam, Shyhtsun Felix Wu:
Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies. Peer-to-Peer Computing 2007: 11-18 - Ivan Dedinski, Alexander Hofmann, Bernhard Sick:
Cooperative Keep-Alives: An Efficient Outage Detection Algorithm for P2P Overlay Networks. Peer-to-Peer Computing 2007: 140-150 - Matteo Dell'Amico:
Mapping Small Worlds. Peer-to-Peer Computing 2007: 219-228 - Michael Duelli, Tobias Hoßfeld, Dirk Staehle:
Impact of Vertical Handovers on Cooperative Content Distribution Systems. Peer-to-Peer Computing 2007: 177-184 - Deger Cenk Erdil, Michael J. Lewis:
Grid Resource Scheduling with Gossiping Protocols. Peer-to-Peer Computing 2007: 193-202 - Donatien Grolaux, Boris Mejías, Peter Van Roy:
PEPINO: PEer-to-Peer network INspectOr. Peer-to-Peer Computing 2007: 247-248 - Cyrus Harvesf, Douglas M. Blough:
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables. Peer-to-Peer Computing 2007: 237-238 - Tobias Heer, Shaohui Li, Klaus Wehrle:
PISA: P2P Wi-Fi Internet Sharing Architecture. Peer-to-Peer Computing 2007: 251-252 - Xinyao Hu, Shicong Meng, Cong Shi, Dingyi Han, Yong Yu:
Predicting Query Duplication with Box-Jenkins Models and Its Applications. Peer-to-Peer Computing 2007: 79-86 - Danny Hughes, James Walkerdine, Kevin Lee:
The Effect of Viral Media on Business Usage of P2P. Peer-to-Peer Computing 2007: 249-250 - Dongmei Jia, Wai Gen Yee, Linh Thai Nguyen, Ophir Frieder:
Distributed, Automatic File Description Tuning in Peer-to-Peer File-Sharing Systems. Peer-to-Peer Computing 2007: 167-176 - Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt:
Completeness Estimation of Range Queries in Structured Overlays. Peer-to-Peer Computing 2007: 71-78 - Piotr Karwaczynski:
Fabric: Synergistic Proximity Neighbour Selection Method. Peer-to-Peer Computing 2007: 229-230 - Fabius Klemm, Sarunas Girdzijauskas, Jean-Yves Le Boudec, Karl Aberer:
On Routing in Distributed Hash Tables. Peer-to-Peer Computing 2007: 113-122 - Joseph S. Kong, Vwani P. Roychowdhury:
Price of Structured Routing and Its Mitigation in P2P Systems under Churn. Peer-to-Peer Computing 2007: 97-104 - Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha:
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent. Peer-to-Peer Computing 2007: 37-44 - Aleksandra Kovacevic, Nicolas Liebau, Ralf Steinmetz:
Globase.KOM - A P2P Overlay for Fully Retrievable Location-based Search. Peer-to-Peer Computing 2007: 87-96 - Thomas Locher, Stefan Schmid, Roger Wattenhofer:
Rescuing Tit-for-Tat with Source Coding. Peer-to-Peer Computing 2007: 3-10 - Fabien Mathieu:
Self-Stabilization in Preference-Based Networks. Peer-to-Peer Computing 2007: 203-210 - Bivas Mitra, Sujoy Ghose, Niloy Ganguly:
How stable are large superpeer networks against attack? Peer-to-Peer Computing 2007: 239-242 - Gabriele Monti, Gianluca Moro, Stefano Lodi:
W*-Grid: A Robust Decentralized Cross-layer Infrastructure for Routing and Multi-Dimensional Data Management in Wireless Ad-Hoc Sensor Networks. Peer-to-Peer Computing 2007: 159-166 - Ulrich Müller, Matt Young, Alain Gefflaut:
Running the Windows P2P Infrastructure on Mobile Phones. Peer-to-Peer Computing 2007: 245-246 - Ravi Rao, Sandeep K. Singhal:
P2P-IM: A P2P Presence System for the Internet. Peer-to-Peer Computing 2007: 233-234 - Souvik Ray, Zhao Zhang:
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables. Peer-to-Peer Computing 2007: 27-36 - Nima Sarshar, Vwani P. Roychowdhury:
An End-to-End Solution to Scalable Unstructured P2P Networking. Peer-to-Peer Computing 2007: 123-131 - Anna Satsiou, Leandros Tassiulas:
A Trust-Based Exchange Framework for Multiple Services in P2P Systems. Peer-to-Peer Computing 2007: 45-52
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-05 01:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint